High Performance Networks - Compilation and Optimization of Protocol Analyzers

Award Information
Agency: Department of Energy
Branch: N/A
Contract: DE-FG02-08ER85046
Agency Tracking Number: N/A
Amount: $749,991.00
Phase: Phase II
Program: SBIR
Awards Year: 2009
Solicitation Year: N/A
Solicitation Topic Code: N/A
Solicitation Number: N/A
Small Business Information
632 Broadway, Suite 803, New York, NY, 10012
DUNS: 022423854
HUBZone Owned: N
Woman Owned: N
Socially and Economically Disadvantaged: N
Principal Investigator
 Steven Reinhardt
 (212) 780-0527
Business Contact
 Steven Reinhardt
Title: Dr.
Phone: (212) 780-0527
Email: stever@reservoir.com
Research Institution
In times when critical national infrastructure depends more than ever on digital networks, the prevention of cyber attacks, as opposed to reacting after security has been compromised, becomes a chief concern. Intrusion Detection and Prevention (IDP) systems serve an indispensable role in proactively preserving the integrity of computer networks under cyber attacks. However, two independent trends are driving IDP solutions to a breaking point: (1) typical pattern-matching IDP solutions deploy low-coverage signatures that can be easily bypassed by new classes of exploits; and (2) as network data rates increase, IDP boxes are overwhelmed by the quantity of computation they must perform to secure the system. This project will explore the use of a new signature generation framework that produces protocol-aware polymorphic-proof signatures with larger coverage. In addition, a novel protocol compiler perspective will be developed to enable the rapid mapping of signature and protocol specifications onto hardware. Phase I identified the core reason leading to the IDP breaking point: lack of protocol-awareness limits the coverage of signatures and makes polymorphic attacks a powerful weapon for bypassing existing security measures. Phase II will use a theoretical and practical framework to implement a commercial-ready high-performance IDP solution based on our compiler approach.Commercial Applications and other Benefits as described by the awardee: High-speed, protocol-aware intrusion detection systems should be useful to organizations (companies, governments, utilities, armed forces, and even individuals) whose valuable assets make them targets of sophisticated cyber attackers. Security and cost savings benefits would accrue when assets are better and more efficiently protected, and commercial enterprises can secure their business operations more effectively and cheaply

* Information listed above is at the time of submission. *

Agency Micro-sites

SBA logo
Department of Agriculture logo
Department of Commerce logo
Department of Defense logo
Department of Education logo
Department of Energy logo
Department of Health and Human Services logo
Department of Homeland Security logo
Department of Transportation logo
Environmental Protection Agency logo
National Aeronautics and Space Administration logo
National Science Foundation logo
US Flag An Official Website of the United States Government